[JIRA] (JENKINS-15213) email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security

2012-12-11 Thread slide.o....@gmail.com (JIRA)














































Slide-O-Mix
 commented on  JENKINS-15213


email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security















Groovy Postbuild's security is easily bypassed, I can add imports at the top of the post-build script and access the Jenkins/Hudson instance all I want, even with the security enabled. I need to research this more, something along the lines of a sandbox if something like that exists.



























This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators.
For more information on JIRA, see: http://www.atlassian.com/software/jira






[JIRA] (JENKINS-15213) email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security

2012-12-11 Thread slide.o....@gmail.com (JIRA)














































Slide-O-Mix
 started work on  JENKINS-15213


email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security
















Change By:


Slide-O-Mix
(11/Dec/12 2:21 PM)




Status:


Open
InProgress



























This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators.
For more information on JIRA, see: http://www.atlassian.com/software/jira






[JIRA] (JENKINS-15213) email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security

2012-12-11 Thread slide.o....@gmail.com (JIRA)














































Slide-O-Mix
 commented on  JENKINS-15213


email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security















I've decided to use the groovy sandbox to disallow interaction with the Jenkins instance when security is enabled for the pre-send script.



























This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators.
For more information on JIRA, see: http://www.atlassian.com/software/jira






[JIRA] (JENKINS-15213) email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security

2012-12-11 Thread scm_issue_l...@java.net (JIRA)














































SCM/JIRA link daemon
 commented on  JENKINS-15213


email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security















Code changed in jenkins
User: Alex Earl
Path:
 src/main/java/hudson/plugins/emailext/ExtendedEmailPublisher.java
 src/main/java/hudson/plugins/emailext/ExtendedEmailPublisherDescriptor.java
 src/main/resources/hudson/plugins/emailext/ExtendedEmailPublisher/global.jelly
 src/main/webapp/help/globalConfig/security.html
http://jenkins-ci.org/commit/email-ext-plugin/062f768561cb0e9b64331b8a43a2820d52971751
Log:
  Fix JENKINS-15213

Allow administrator to enable security for pre-send scripts. This is a
breaking change for current pre-send scripts.





























This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators.
For more information on JIRA, see: http://www.atlassian.com/software/jira






[JIRA] (JENKINS-15213) email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security

2012-10-31 Thread slide.o....@gmail.com (JIRA)














































Slide-O-Mix
 commented on  JENKINS-15213


email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security















Need to have a new LTS released which fixes the readonly textarea issue.



























This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators.
For more information on JIRA, see: http://www.atlassian.com/software/jira






[JIRA] (JENKINS-15213) email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security

2012-09-18 Thread dan...@beckweb.net (JIRA)














































Daniel Beck
 created  JENKINS-15213


email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security















Issue Type:


Bug



Affects Versions:


current



Assignee:


Slide-O-Mix



Components:


email-ext



Created:


18/Sep/12 10:43 AM



Description:


The ability to run a script prior to sending email was introduced in email-ext, a plugin with 10k+ installations, version 2.22 for JENKINS-12421.

This allows users to exploit their job configure privilege for a single job to gain access to all of Jenkins, circumventing any security measures.

Steps to reproduce
1. In project based matrix security (most severe permissions issue), give "User" overall read permission. Create job "Job" and give read/configure/build permissions to "User"
2. Log out and back in as "User"
3. Configure "Job" to send email-ext (upon success).
4. Set the pre-build script to e.g. "Hudson.instance.doQuietDown()" or "Hudson.instance.projects.each { it.disable() }"
5. Start a build

Result
Jenkins is quieting down, or all projects have been disabled, depending on the script. Everything else is possible as well.

Notes
This feature cannot be deactivated, like Groovy Postbuild's "restrict access to internal objects", or used in a safe way by privileged users only, like Groovy's requiring administration permissions for adding or editing Groovy System build steps.

This issue is identical to SECURITY-35 of June 23rd. Maybe it will get a better response as a public issue.




Environment:


Since 2.22, including 2.24.1




Project:


Jenkins



Priority:


Major



Reporter:


Daniel Beck

























This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators.
For more information on JIRA, see: http://www.atlassian.com/software/jira






[JIRA] (JENKINS-15213) email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security

2012-09-18 Thread slide.o....@gmail.com (JIRA)














































Slide-O-Mix
 commented on  JENKINS-15213


email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security















Thanks for bringing this up, most devs don't get copied on SECURITY issues, so that's why it hasn't been looked at. I'll at it soon.



























This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators.
For more information on JIRA, see: http://www.atlassian.com/software/jira






[JIRA] (JENKINS-15213) email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security

2012-09-18 Thread slide.o....@gmail.com (JIRA)














































Slide-O-Mix
 commented on  JENKINS-15213


email-ext 2.22+ allows any user with configure permission for a single job to circumvent Jenkins security















Yes, in fact I don't even have access to SECURITY-35, so it would have never been seen.



























This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators.
For more information on JIRA, see: http://www.atlassian.com/software/jira